1 STRINT IETF / W3C Security Workshop London, UK, March 2014 Juan Carlos Zuniga.

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

Requirements for Internet Access in Public Places Anand Balachandran University of California, San Diego
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
802.1x EAP Authentication Protocols
Chapter 11 E-Commerce Security. Electronic CommercePrentice Hall © Learning Objectives 1.Document the trends in computer and network security attacks.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
1 privecsg IEEE 802 EC Privacy Recommendation Study Group Update to IEEE802 March 2015 Plenary meeting Juan Carlos Zuniga, InterDigital.
1 privecsg IEEE 802 EC Privacy Recommendation Study Group Update to March 2015 Plenary meeting Juan Carlos Zuniga,
WIRELESS LAN SECURITY Using
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Privecsg ecsg 1 IEEE 802 EC Privacy Recommendation SG 802 Plenary Meeting March 9-13, 2015 Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Privecsg ecsg 1 IEEE 802 EC Privacy Recommendation Study Group Update to 802 Sept Interim meetings Juan Carlos Zuniga, InterDigital.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Chapter 21 Distributed System Security Copyright © 2008.
1 privecsg IEEE 802 EC Privacy Recommendation Study Group Update to July 2015 Plenary meeting Juan Carlos Zuniga,
Requirements, Terminology and Framework for Exigent Communications H. Schulzrinne, S. Norreys, B. Rosen, H. Tschofenig.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Objectives  Explain the role of Data Link layer protocols in data transmission.  Describe how the Data Link layer prepares data for transmission on.
Privecsg ecsg 1 IEEE 802 EC Privacy Recommendation SG 802 Plenary Meeting January 12-16, 2015 Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
Privecsg ecsg 1 IEEE 802 EC Privacy Recommendation SG Closing Report 802 Plenary Meeting March 9-13, 2015 Juan Carlos Zuniga, InterDigital Labs.
1 privecsg ecsg IEEE 802 EC Privacy Recommendation SG Comments on Privacy PAR/CSD March, 2015 Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
Privecsg ‹#› IEEE 802 Privacy concerns about 802c PAR Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZunigaInterDigital.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Doc.: IEEE dep Submission March 2013 Jussi Haapola (CWC) Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
March 2006 CAPWAP Protocol Specification Update March 2006
Solving the Security Risks of WLAN Tuukka Karvonen
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 privecsg IEEE 802 EC Privacy Recommendation Study Group Update to July 2015 Plenary meeting Juan Carlos Zuniga,
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
IP Address Location Privacy and Mobile IPv6: Problem Statement draft-irtf-mobopts-location-privacy-PS-00.txt Rajeev Koodli.
IS3220 Information Technology Infrastructure Security
SIPREC Requirements for Media Recording using SIP IETF 77, Anaheim Ken Rehor on behalf of the team Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain,
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
CSE 4905 Network Security Overview
Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
Human rights in technical standards: our practical approach
draft-ipdvb-sec-01.txt ULE Security Requirements
802E Privacy Recommendations Update to
Privacy Recommendations for 802 LMSC Section 8: Recommendations
Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
802E Privacy Recommendations Update to
IEEE 802 EC Privacy Recommendation SG November, 2014, Report to 802 EC
Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
WLAN Architectural Considerations for IETF CAPWAP
Next-generation Internet architecture
Presentation transcript:

1 STRINT IETF / W3C Security Workshop London, UK, March 2014 Juan Carlos Zuniga

Threat Model Five main classes of attack Pervasive passive attack [metadata, correlation] Pervasive active attack [access in the network core] Static key exfiltration Dynamic key exfiltration Content exfiltration 2

Collaborators A legitimate actor giving help to the attacker Static: One-time help (e.g., private key) Dynamic: Ongoing, per-session help Content: The desired content itself Witting or unwitting Your IT can collaborate on your behalf Real or virtual Hand over key data or make it predictable 3

Summary Attackers will do all five attack classes Attacks can be performed in different ways Threats to Objects – Metadata, content Threats to Venue – Infrastructure and links (from TLS down) Technology can be used to increase cost of attack Tech cost (passive-> active) Risk of exposure (static -> dynamic, target dispersal) 4

Possible implications /considerations for IEEE 802 Generic protocol guidelines (e.g. Privacy) should we equally applicable to most 802 protocols Link layer encryption (not only data) MAC addresses Broadcast identifiers Size and sequence of messages 5